IEEE Joint Intelligence and Security Informatics Conference (JISIC) 2014
[Intelligence and Security Informatics and European Intelligence and
Security Informatics Conference]
September 24-26, The Hague, The Netherlands
http://www.eisic.org
CALL FOR PAPERS
Since 2003 the IEEE International Conference on Intelligence and Security
Informatics (ISI) is the leading international scientific conference on
interdisciplinary research on information technology for intelligence,
safety and security. In 2011, the European counterpart of the ISI started
as European Intelligence and Security Informatics Conference (EISIC). For
the first time both events meet in the IEEE Joint Intelligence and Security
Informatics Conference (JISIC), enabling international researchers on the
challenging field of intelligence and security informatics to share ideas
on problems, solutions and new directions.
IEEE JISIC features six tracks that are chaired by leading researchers on
the respective theme:
1. Forensic Intelligence (Jeroen Keppens - King's College London)
2. Decisioning and Interaction (John Stasko - Georgia Institute of
Technology)
3. Cyber and infrastructure security (V.S. Subrahmanian - University of
Maryland)
4. Financial and fraud analysis (Niall Adams - Imperial College London)
5. Computational criminology (Thomas Holt - Michigan State University)
6. Border Control (Jakub Piskorski - FRONTEX)
PAPER SUBMISSION
We invite academic researchers in the field of Intelligence and Security
Informatics and related areas as well as companies, industry consultants,
analysts and practitioners in the fields involved to submit papers and
proposals for tutorials. We are soliciting both research and practice and
experience papers on the topics of the proposed tracks and related topics.
Research papers should either: (a) present results of substantial
research/scientific work (long papers, 8 pages max), (b) report on an
ongoing research activity/effort, ideas and new challenges (short papers, 4
pages max).
Experience papers (short papers) should describe experiences encountered in
applying novel research results and methods in the context of the
conference and/or report on innovative solutions with strong application
potential that are not yet on the market, or are on the market, but require
guidance regarding further steps in order to convert them into real-world
solutions. Submissions should be written in technical style rather than
sales styles.
TUTORIAL PROPOSALS
We seek to extend IEEE JISIC 2014 experience by tutorials on selected
topics given by renowned scientists and practitioners in their fields. We
solicit proposals for half-day tutorials. Tutorials may be lectures,
interactive workshops, hands-on training, or any combination of the above.
Exploring diverse ways of interacting with the audience is welcome as are
cross-disciplinary topics.
IMPORTANT DATES
* Paper submission due: June 1, 2014
* Notification of acceptance: July 1, 2014
* Camera ready paper due: July 18, 2014
* Authors registration due: July 18, 2014
* Conference: September 24-26, 2014
TRACK DESCRIPTIONS
1. Forensic Intelligence
A broad range of disparate techniques to tackle evidential reasoning and
forensic investigation have emerged from a variety of fields, including
argumentation, probabilistic, narrative and knowledge management based
approaches to collect and assess evidence, and to manage and coordinate
investigations. This track aims to bring together academic researchers and
practitioners with interests in evidential reasoning and forensic
investigation from disparate fields such as statistics, artificial
intelligence, decision sciences, forensic sciences and law, to present new
developments in their respective areas and encourage cross-fertilisation
between often disparate fields of research and practice.
2. Decisioning and Interaction
The track will explore interactive technologies that assist in the
decision-making processes of security-related domains. This includes
visualization and visual analytics systems, interactive decision-support
and analytical reasoning systems, and other forms of multimedia information
systems. A key component of this track is a human-in-the-loop interaction
technology where computational analyses are complemented by human
exploration and investigation.
3. Cyber and Infrastructure Security
The Security track focuses on computational models of intelligence, safety
and security aspects of crime and terrorism in the context of critical
infrastructure and cyberspace. Papers making both theoretical and practical
aspects of these topics are welcome. Interdisciplinary and applied papers,
where existing computational methods are applied or adapted to the solution
of real-world problems in these domains are particularly encouraged.
4. Financial and Fraud Analysis
Financial fraud is a serious problem, damaging both international economies
and personal lives. The areas in which financial fraud can occur are
diverse, including retail finance, insurance, corporate banking and
internet transactions. A broad range of tactics are employed by fraudsters
to obtain illegal advantage. Moreover, the area of fraud is an arms-race,
with fraudsters constantly changing tactics to circumvent protection
systems. Thus, methodology that is capable of automatically adapting to
such changes is of special interest. Many financial fraud applications have
the character of “big data”, in which a very small signal must be extracted
from very large and complex data. This track will gather novel research
contributions in the area of financial fraud, with the intention of gaining
insight from diverse methodologies and application areas.
5. Computational criminology
This track will provide examinations of offender behavior, victimology, and
law enforcement practices utilizing statistical analysis techniques and
unique data sources. This includes tests of various criminological
theories, assessments of social network structures, and organizational
practices of terror groups, cybercriminals, and gangs. Evaluations of
crime prevention strategies, intelligence led policing, and issues of
public safety, privacy, and security will also be a focus of this track.
6. Border Control
This track solicits papers reporting research work relevant in the context
of addressing practical operational challenges encountered by the border
control community. Among others, topics of interest include: (a)
authentication of documents, people and vehicles, (b) risk assessment of
travelers, (c) modelling and optimization of the border control processing
chain, (d) border surveillance, (e) platforms, protocols and techniques for
secure exchange of information and communication, (f) text/data mining,
information fusion and utilization of new sources of information for
intelligence gathering and situational awareness, and (g) border control
technology impact, acceptance and integration.
We are looking forward to see you in The Hague - City of Peace and Justice
The IEEE JISIC Organizing Team
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.aisnet.org/pipermail/aisworld_lists.aisnet.org/attachments/20140424/793c3583/attachment.html>